[CompNetSec] - 03 - Classical Encryption Techniques

This lecture covers classical encryption techniques, including an introduction, the symmetric cipher model, relevant definitions, and a simplified model of symmetric encryption.

Hicham Elmongui14.6K views01:20:02

🔥 Related Trending Topics

LIVE TRENDS

This video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!

THIS VIDEO IS TRENDING!

This video is currently trending in Saudi Arabia under the topic 'new zealand national cricket team vs west indies cricket team match scorecard'.

About this video

* Intro (time: 0:00) * Symmetric Cipher Model (slide(s): 3-7, time: 1:14) - Definitions (slide(s): 4, time: 1:55) - Simplified Model of Symmetric Encryption (slide(s): 5-7, time: 4:03) * Cryptographic Systems (slide(s): 8, time: 11:30) * Cryptanalysis and Brute-Force Attack (slide(s): 9, time: 14:14) - Cryptanalysis (slide(s): 9, time: 14:44) - Brute-Force (slide(s): 9, time: 14:40) * Types of Attacks (slide(s): 10, time: 19:38) - Ciphertext only (slide(s): 10, time: 19:43) - Known Plaintext (slide(s): 10, time: 20:09) - Chosen Plaintext (slide(s): 10, time: 20:44) - Chosen Chipter (slide(s): 10, time: 22:46) - Chosen Text (slide(s): 10, time: 22:59) * Encryption Scheme Security (slide(s): 11, time: 23:39) - Unconditionally Secure (slide(s): 11, time: 24:18) - Computationally Secure (slide(s): 11, time: 24:47) * Brute-Force Attack (slide(s): 12, time: 27:05) * Substitution Techniques (slide(s): 13-28, time: 28:57) - Caesar Cipher (slide(s): 14-16, time: 30:29) - Refer to {Part 1, slide(s): 15} (slide(s): 15, time: 34:58) - Monoalphabetic Cipher (slide(s): 17-19, time: 37:58) - Playfair Cipher (slide(s): 20-21, time: 45:18) - Polyalphabetic Ciphers (slide(s): 22, time: 52:20) - Vigenère Cipher (slide(s): 23-24, time: 53:43) - [Improvement] Vigenère Autokey System (slide(s): 25, time: 58:00) - Vernam Cipher (slide(s): 26, time: 1:00:01) - [Improvement] One-Time Pad (slide(s): 27-28, time: 1:04:54) * Transposition (slide(s): 29, 1:09:51) - Row Transposition Cipher (slide(s): 29, time: 1:10:07) * Steganography (slide(s): 30, time: 1:12:14) * Other Steganography Techniques (slide(s): 31, time: 1:15:31) * Steganography vs. Encryption (slide(s): 32, time: 1:17:22) * Summary (slide(s): 33, time: 1:19:22) ANNOTATION BY: an SSP CCE 2021 alumnus who prefered to be anonymous! --Computer and Network Security

Video Information

Views
14.6K

Total views since publication

Duration
01:20:02

Video length

Published
Oct 23, 2020

Release date

Quality
hd

Video definition